Analysis
-
max time kernel
132s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2023 19:17
Static task
static1
Behavioral task
behavioral1
Sample
9de40f73e3f1364ef2754e81d973c6d05f4c3ac1e0b7c9fe9518e36f1ef33c2a.exe
Resource
win10v2004-20230220-en
General
-
Target
9de40f73e3f1364ef2754e81d973c6d05f4c3ac1e0b7c9fe9518e36f1ef33c2a.exe
-
Size
521KB
-
MD5
91f4ad6c3dbf278937e62ef1d239db77
-
SHA1
d1d40fba83b7273fd14a7bf24778a67d5e037b5c
-
SHA256
9de40f73e3f1364ef2754e81d973c6d05f4c3ac1e0b7c9fe9518e36f1ef33c2a
-
SHA512
884e07faabe84c8419e61d9bc439efd4bba3f01db42eaa8d36c5640e3f17b938812946ab2db15b7c3c4fdafa787f6ad297c925ddd17a81a525e94d7d3572f8da
-
SSDEEP
12288:RMrjy90YkuKK5uXvlNxBx9s6bS0l60wbpOP:yyUxzs6Ns0T
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
Processes:
jr396878.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr396878.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr396878.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr396878.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr396878.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr396878.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr396878.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
Processes:
resource yara_rule behavioral1/memory/1556-157-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/1556-158-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/1556-160-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/1556-162-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/1556-164-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/1556-166-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/1556-170-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/1556-168-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/1556-172-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/1556-174-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/1556-176-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/1556-178-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/1556-180-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/1556-182-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/1556-184-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/1556-186-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/1556-188-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/1556-190-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/1556-192-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/1556-194-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/1556-196-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/1556-198-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/1556-200-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/1556-202-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/1556-204-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/1556-206-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/1556-208-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/1556-210-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/1556-212-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/1556-214-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/1556-216-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/1556-218-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline behavioral1/memory/1556-220-0x0000000004A80000-0x0000000004ABF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
ziwg8983.exejr396878.exeku518077.exelr448744.exepid process 2148 ziwg8983.exe 1292 jr396878.exe 1556 ku518077.exe 4480 lr448744.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
jr396878.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr396878.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
9de40f73e3f1364ef2754e81d973c6d05f4c3ac1e0b7c9fe9518e36f1ef33c2a.exeziwg8983.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 9de40f73e3f1364ef2754e81d973c6d05f4c3ac1e0b7c9fe9518e36f1ef33c2a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9de40f73e3f1364ef2754e81d973c6d05f4c3ac1e0b7c9fe9518e36f1ef33c2a.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziwg8983.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziwg8983.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 3112 sc.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 768 1556 WerFault.exe ku518077.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
jr396878.exeku518077.exelr448744.exepid process 1292 jr396878.exe 1292 jr396878.exe 1556 ku518077.exe 1556 ku518077.exe 4480 lr448744.exe 4480 lr448744.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
jr396878.exeku518077.exelr448744.exedescription pid process Token: SeDebugPrivilege 1292 jr396878.exe Token: SeDebugPrivilege 1556 ku518077.exe Token: SeDebugPrivilege 4480 lr448744.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
9de40f73e3f1364ef2754e81d973c6d05f4c3ac1e0b7c9fe9518e36f1ef33c2a.exeziwg8983.exedescription pid process target process PID 4696 wrote to memory of 2148 4696 9de40f73e3f1364ef2754e81d973c6d05f4c3ac1e0b7c9fe9518e36f1ef33c2a.exe ziwg8983.exe PID 4696 wrote to memory of 2148 4696 9de40f73e3f1364ef2754e81d973c6d05f4c3ac1e0b7c9fe9518e36f1ef33c2a.exe ziwg8983.exe PID 4696 wrote to memory of 2148 4696 9de40f73e3f1364ef2754e81d973c6d05f4c3ac1e0b7c9fe9518e36f1ef33c2a.exe ziwg8983.exe PID 2148 wrote to memory of 1292 2148 ziwg8983.exe jr396878.exe PID 2148 wrote to memory of 1292 2148 ziwg8983.exe jr396878.exe PID 2148 wrote to memory of 1556 2148 ziwg8983.exe ku518077.exe PID 2148 wrote to memory of 1556 2148 ziwg8983.exe ku518077.exe PID 2148 wrote to memory of 1556 2148 ziwg8983.exe ku518077.exe PID 4696 wrote to memory of 4480 4696 9de40f73e3f1364ef2754e81d973c6d05f4c3ac1e0b7c9fe9518e36f1ef33c2a.exe lr448744.exe PID 4696 wrote to memory of 4480 4696 9de40f73e3f1364ef2754e81d973c6d05f4c3ac1e0b7c9fe9518e36f1ef33c2a.exe lr448744.exe PID 4696 wrote to memory of 4480 4696 9de40f73e3f1364ef2754e81d973c6d05f4c3ac1e0b7c9fe9518e36f1ef33c2a.exe lr448744.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9de40f73e3f1364ef2754e81d973c6d05f4c3ac1e0b7c9fe9518e36f1ef33c2a.exe"C:\Users\Admin\AppData\Local\Temp\9de40f73e3f1364ef2754e81d973c6d05f4c3ac1e0b7c9fe9518e36f1ef33c2a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziwg8983.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziwg8983.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr396878.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr396878.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1292
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku518077.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku518077.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1556 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1556 -s 13524⤵
- Program crash
PID:768
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr448744.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr448744.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4480
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1556 -ip 15561⤵PID:4616
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:3112
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5f031eb34ddd698a2dc82280d43cd87e2
SHA1ed580e673be25151de29292719743a1761437c85
SHA2567790777cf13c01f61ff7e1ba397a7c045578ae46e4626a29416213f9dccd49c5
SHA512145acb8b996b138bdfd2458ead0a25608568e853adf862653278b595c3d74570d7d438fe0a8b52a4ba5dc30cabe41153dc53e0b1c3b569eb165739841b835324
-
Filesize
175KB
MD5f031eb34ddd698a2dc82280d43cd87e2
SHA1ed580e673be25151de29292719743a1761437c85
SHA2567790777cf13c01f61ff7e1ba397a7c045578ae46e4626a29416213f9dccd49c5
SHA512145acb8b996b138bdfd2458ead0a25608568e853adf862653278b595c3d74570d7d438fe0a8b52a4ba5dc30cabe41153dc53e0b1c3b569eb165739841b835324
-
Filesize
379KB
MD5976426e4755e69a7310c093290718584
SHA14e10163d7fa94bd77ef254eec079bb90f9c37e95
SHA25653f1ac4142900796ad51fe500a4e7c9c9047809f69498915a9c5fba2a7d265b9
SHA512d25205691aff5216777efc451473df2794009437bb0aec7badc6daa6b2aa2bfc86ab5c2b64fa0beed4e64c00fd209b0c5c2855d58be5f3ce2f1ddd15d68ecb8b
-
Filesize
379KB
MD5976426e4755e69a7310c093290718584
SHA14e10163d7fa94bd77ef254eec079bb90f9c37e95
SHA25653f1ac4142900796ad51fe500a4e7c9c9047809f69498915a9c5fba2a7d265b9
SHA512d25205691aff5216777efc451473df2794009437bb0aec7badc6daa6b2aa2bfc86ab5c2b64fa0beed4e64c00fd209b0c5c2855d58be5f3ce2f1ddd15d68ecb8b
-
Filesize
11KB
MD5bf41791ec502a80e498da916c9b37da4
SHA172a623f9c01a63c12c5cae1a3cba1df1b3ce2e5e
SHA2563768ed5fd6e4f4767846342e9a3acd616d5cfa4c33718dd1a4d61a353674e348
SHA5128605aa607e9f73f2a2f4e6b3f94e7ec2122dc813b07b4604724242f53f7e7238f440ed8d20af2f93377b964ee15c6d6155cfa50cf02a86168ce10e70b3556cc5
-
Filesize
11KB
MD5bf41791ec502a80e498da916c9b37da4
SHA172a623f9c01a63c12c5cae1a3cba1df1b3ce2e5e
SHA2563768ed5fd6e4f4767846342e9a3acd616d5cfa4c33718dd1a4d61a353674e348
SHA5128605aa607e9f73f2a2f4e6b3f94e7ec2122dc813b07b4604724242f53f7e7238f440ed8d20af2f93377b964ee15c6d6155cfa50cf02a86168ce10e70b3556cc5
-
Filesize
294KB
MD5fdb76badb3522b2636c91f9946e78e2b
SHA1f7ef2d8c70a568e2661f71c5575f513a59bad17b
SHA256273d6c05eb8e3f55bfa812f0fa05433170105a1661ced2d3807e377b61f4f51a
SHA5124ca083ac5b8cb5f866042887b394db6f61b901e6fa7cdca7eeadc5dd65774ce9fa80f6e9c66a524df2bd34a85d9b0db361261a4eb285f165b0b3f5831094004e
-
Filesize
294KB
MD5fdb76badb3522b2636c91f9946e78e2b
SHA1f7ef2d8c70a568e2661f71c5575f513a59bad17b
SHA256273d6c05eb8e3f55bfa812f0fa05433170105a1661ced2d3807e377b61f4f51a
SHA5124ca083ac5b8cb5f866042887b394db6f61b901e6fa7cdca7eeadc5dd65774ce9fa80f6e9c66a524df2bd34a85d9b0db361261a4eb285f165b0b3f5831094004e